Confidentiality of Electronic Health Data: Methods for Protecting Personally Identifiable Information. Encryption

07/03/1996

Abou-Tayiem E. Implementation of the RSA public-key cryptosystem.

Stevenage (Herts, UK): Institution of Electrical Engineers; 1995.

Baum MS. Federal certification authority liability and policy. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1994 Jun. Report No: NIST GCR 94-654. Available from: NTIS, Springfield, VA; PB94-191202.

Garfinkel S. PCP: pretty good privacy. Sebastopol (CA): O'Reilly & Associates, Inc.; 1994.

Houser WR. NIST's 'victory' will save DSS users an arm and a leg. Gov Comput News 1993 Jul 5;12(14):25-6.

National Institute of Standards and Technology (US). Proposed Federal Information Processing Standard (FIPS) for public key cryptographic entity authentication mechanisms. Fed Regist 1995 Jun 6;60(108):29830-2.

National Institute of Standards and Technology (US), Computer Systems Laboratory. Appendix 5. Example of the DSA. Gaithersburg (MD): The Institute; 1995 Oct 2. (Federal information processing standards; FIPS PUB 186).

National Institute of Standards and Technology (US), Computer Systems Laboratory. Data encryption standard. Gaithersburg (MD): The Institute; 1993 Dec (Reaffirmed until 1998). (Federal information processing standards; FIPS PUB 46-2). Available from: NTIS, Springfield, VA.

National Institute of Standards and Technology (US), Computer Systems Laboratory. Escrowed encryption standard (EES). Gaithersburg (MD): The Institute; 1994 Feb. (Federal information processing standards; FIPS PUB 185). Available from: NTIS, Springfield, VA.

National Institute of Standards and Technology (US), Computer Systems Laboratory. Key management using ANSI X9.17. Gaithersburg (MD): The Institute; 1992 Apr. (Federal information processing standards; FIPS PUB 171). Available from: NTIS, Springfield, VA.

National Institute of Standards and Technology (US), Computer Systems Laboratory. Security requirements for cryptographic modules. Gaithersburg (MD): The Institute; 1994 Jan. (Federal information processing standards; FIPS PUB 140-1). Available from: NTIS, Springfield, VA.

National Institute of Standards and Technology (US), Computer Systems Laboratory. Standard on computer data authentication. Gaithersburg (MD): The Institute; 1985 May. (Federal information processing standards; FIPS PUB 113). Available from: NTIS, Springfield, VA.

Oldehoeft AE, Branstad D, editors. Report of the NIST Workshop on Key Escrow Encryption. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1994 Jun. Report No.: NIST Internal Report (NISTIR) 5468. Available from: NTIS, Springfield, VA; PB94-209459.

Olnes J. EDIFACT security made simple-the EDIMED approach. Comput Secur 1993 Dec;12(8):765-74.

Schneier B. Applied cryptography: protocols, algorithms and source code in C. 2nd ed. New York: Wiley & Sons, Inc.; 1995.

Stevens A. Hacks, spooks, and data encryption. Dr Dobbs J 1990 Sep;15(9):127-38.

Zamparo R. A study of OSI key management. Gaithersburg (MD):

National Institute of Standards and Technology (US), Computer Systems Laboratory; 1992 Nov. Report No.: NIST Internal Report (NISTIR) 4983. Available from: NTIS, Springfield, VA; PB93-151579.